팔로우
Jean-Michel PICOD
Jean-Michel PICOD
Google Switzerland
google.com의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Cloak of visibility: Detecting when machines browse a different web
L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ...
2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016
1122016
Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016
912016
Bringing software defined radio to the penetration testing community
JM Picod, A Lebrun, JC Demay
Black Hat USA Conference, 2014
502014
Doing forensics in the cloud age OWADE: beyond files recovery forensic
E Bursztein, IF Cassidian, M Martin, JM Picod
Black Hat, 2011
122011
Recovering Windows Secrets and {EFS} Certificates Offline
E Burzstein, JM Picod
4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010
122010
Hybrid post-quantum signatures in hardware security keys
D Ghinea, F Kaczmarczyck, J Pullman, J Cretin, S Kölbl, R Misoczki, ...
International Conference on Applied Cryptography and Network Security, 480-499, 2023
82023
A hacker guide to deep-learning based side channel attacks
E Bursztein, JM Picod
Defcon27 https://elie. net/talk/a-hackerguide-to-deep-learning-based-side …, 2019
52019
Attacking encrypted USB keys the hard (ware) way
JM Picod, R Audebert, S Blumenstein, E Bursztein
Black Hat USA, 2017
52017
Reversing dpapi and stealing windows secrets offline
JM Picod, E Bursztein
BlackHat DC 2010, 2010
42010
Generic attacks against cryptographic hardware through long-range deep learning
E Bursztein, L Invernizzi, K Král, D Moghimi, JM Picod, M Zhang
arXiv preprint arXiv:2306.07249, 2023
12023
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
E Bursztein, L Invernizzi, K Král, D Moghimi, JM Picod, M Zhang
arXiv e-prints, arXiv: 2306.07249, 2023
2023
Security Competitions
A Doupé, W Robertson, P Berrang, C Lewis, D Levin, A Hecksteden, ...
25th USENIX Security Symposium (USENIX Security 16), 1223-1240, 2016
2016
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–12